Congestion Games with Multisets of Resources and Applications in Synthesis

Total Page:16

File Type:pdf, Size:1020Kb

Congestion Games with Multisets of Resources and Applications in Synthesis Congestion Games with Multisets of Resources and Applications in Synthesis Guy Avni1, Orna Kupferman1, and Tami Tamir2 1 School of Computer Science and Engineering, The Hebrew University, Jerusalem, Israel 2 School of Computer Science, The Interdisciplinary Center, Israel Abstract In classical congestion games, players’ strategies are subsets of resources. We introduce and study multiset congestion games, where players’ strategies are multisets of resources. Thus, in each strategy a player may need to use each resource a different number of times, and his cost for using the resource depends on the load that he and the other players generate on the resource. Beyond the theoretical interest in examining the effect of a repeated use of resources, our study enables better understanding of non-cooperative systems and environments whose behavior is not covered by previously studied models. Indeed, congestion games with multiset-strategies arise, for example, in production planing and network formation with tasks that are more involved than reachability. We study in detail the application of synthesis from component libraries: different users synthesize systems by gluing together components from a component library. A component may be used in several systems and may be used several times in a system. The performance of a component and hence the system’s quality depends on the load on it. Our results reveal how the richer setting of multisets congestion games affects the stability and equilibrium efficiency compared to standard congestion games. In particular, while we present very simple instances with no pure Nash equilibrium and prove tighter and simpler lower bounds for equilibrium inefficiency, we are also able to show that some of the positive results known for affine and weighted congestion games apply to the richer setting of multisets. 1998 ACM Subject Classification F.2.0 Analysis of algorithms and problem complexity – Gen- eral, J.4 Social and behavioral sciences – Economics Keywords and phrases Congestion games, Multiset strategies, Equilibrium existence and com- putation, Equilibrium inefficiency Digital Object Identifier 10.4230/LIPIcs.FSTTCS.2015.365 1 Introduction Congestion games model non-cooperative resource sharing among selfish players. Resources may be shared by the players and the cost of using a resource increases with the load on it. Such a cost paradigm models settings where high congestion corresponds to lower quality of service or higher delay. Formally, each resource e is associated with an increasing latency function fe : IN → IR, where fe(`) is the cost of a single use of e when it has load `. Previous work on congestion games assumes that players’ strategies are subsets of resources, as is the case in many applications, most notably routing and network design. For example, in the setting of networks, players have reachability objectives and strategies are subsets of edges, each inducing a simple path from the source to the target [29, 3, 19]. We introduce and study multiset games, where players’ strategies are multisets of resources. Thus, a player may need a resource multiple times – depending on the specific resource and strategy, and © Guy Avni, Orna Kupferman, and Tami Tamir; licensed under Creative Commons License CC-BY 35th IARCS Annual Conf. Foundations of Software Technology and Theoretical Computer Science (FSTTCS 2015). Editors: Prahladh Harsha and G. Ramalingam; pp. 365–379 Leibniz International Proceedings in Informatics Schloss Dagstuhl – Leibniz-Zentrum für Informatik, Dagstuhl Publishing, Germany 366 Congestion Games with Multisets of Resources and Applications in Synthesis his cost for using the resource depends on the load that he and the other players generate on it. Formally, in multiset congestion games (MCGs, for short), a player that uses j times a resource e that is used ` times by all players together, pays j · fe(`) for these uses. Beyond the theoretical interest in examining the effect of multisets on the extensively- studied classical games, multiset congestion games arise naturally in many applications and environments. The use of multisets enables the specification of rich settings that cannot be specified by means of subsets. We give here several examples. As a first example, consider network formation. In addition to reachability tasks, which involve simple paths (and hence, subsets of resources), researchers have studied tasks whose satisfaction may involve paths that are not simple. For example, a user may want to specify that each traversal of a low-security channel is followed by a visit to a check-sum node. A well-studied class of tasks that involve paths that need not be simple are these associated with a specific length, such as patrols in a geographical region. Several communication protocols are based on the fact that a message must pass a pre-defined length before reaching its destination, either for security reasons (e.g., in Onion routing, where the message is encrypted in layers [27]) or for marketing purposes (e.g., advertisement spread in social networks). In addition, tasks of a pre-defined length are the components of proof-of-work protocols that are used to deter denial of service attacks and other service abuses such as spam (e.g., [15]), and of several protocols for sensor networks [7]. The introduction of multiset corresponds to strategies that are not necessarily simple paths [5]. In production systems or in planning, a system is modeled by a network whose nodes correspond to configurations and whose edges correspond to actions performed by resources. Users have tasks, that need to be fulfilled by taking sequences of actions. This setting corresponds to an MCG in which the strategies of the players are multisets of actions that fulfill their tasks, which indeed often involve repeated execution of actions [13]; for example “once the arm is up, do not put it down until the block is placed". Also, multiset games can model preemptive scheduling, where the processing of a job may split in several feasible ways among a set of machines. Our last example, which we are going to study in detail, is synthesis form component libraries. A central problem in formal methods is synthesis [26], namely the automated construction of a system from its specification. In real life, hardware and software systems are rarely constructed from scratch. Rather, a system is typically constructed from a library of components by gluing components from a library (allowing multiple uses) [23]. For example, when designing an internet browser, a designer does not implement the TCP protocol but uses existing implementations as black boxes. The library of components is used by multiple users simultaneously, and the usages are associated with costs. The usage cost can either decrease with load (e.g., when the cost of a component represents its construction price, the users of a component share this price) as was studied in [4], or increase with load (e.g., when the components are processors and a higher load means slower performance). The later scenario induces an instance of an MCG. Let us demonstrate the intricacy of the multiset setting with the question of the existence of a pure Nash equilibrium (PNE). That is, whether each instance of the game has a profile of pure strategies that constitutes a PNE – a profile such that no player can decrease his cost by unilaterally deviating from his current strategy. By [28], classical congestion games are potential games and thus always have a PNE. Moreover, by [19], in a symmetric congestion game, a PNE can be found in polynomial time. As we show in Example 1 below, a PNE might not exist in an MCG even in a symmetric two-player game over identical resources. G. Avni, O. Kupferman, and T. Tamir 367 Table 1 Players costs. Each entry describes the cost of Player 1 followed by the cost of Player 2. {a, a, b} {b, b, c} {c, c, a} {a, a, b} 36, 36 19, 17 17, 19 {b, b, c} 17, 19 36, 36 19, 17 {c, c, a} 19, 17 17, 19 36, 36 Example 1: Consider the following symmetric MCG with two players and three resources: a, b, and c. The players’ strategy space is {a, a, b} or {b, b, c} or {c, c, a}. That is, a player needs to access some resource twice and the (cyclically) consequent resource once. The 2 latency function of all three resources is the same, specifically, fa(`) = fb(`) = fc(`) = ` . The players’ costs in all possible profiles are given in Table 1. We show that no PNE exists in this game. Assume first that the two players select distinct strategies, w.l.o.g. {a, a, b} and {b, b, c}. In this profile, a is accessed twice, b is accessed three times, and c is accessed once. Thus, every access of a, b and c costs 4, 9 and 1 respectively. The cost of Player 1 is 8 + 9 = 17, while the cost of Player 2 is 18 + 1 = 19. By deviating to {c, c, a}, the cost of Player 2 will reduce to 17 (while the cost of Player 1 will increase to 19). Thus, no PNE in which the players select different strategies exists. If the player select the the same strategy, then one resource is accessed 4 times, and one resource is accessed twice, implying that the cost of both players is 2 · 16 + 1 · 4 = 36, and any deviation is profitable. We conclude that no PNE exists in the game. We study and answer the following questions in general and for various classes of multiset congestion games (for formal definitions, see Section 2): (i) Existence of a PNE. (ii) An analysis of equilibrium inefficiency.A social optimum (SO) of the game is a profile that minimizes the total cost of the players; thus, the one obtained when the players obey some centralized authority.
Recommended publications
  • Potential Games. Congestion Games. Price of Anarchy and Price of Stability
    8803 Connections between Learning, Game Theory, and Optimization Maria-Florina Balcan Lecture 13: October 5, 2010 Reading: Algorithmic Game Theory book, Chapters 17, 18 and 19. Price of Anarchy and Price of Staility We assume a (finite) game with n players, where player i's set of possible strategies is Si. We let s = (s1; : : : ; sn) denote the (joint) vector of strategies selected by players in the space S = S1 × · · · × Sn of joint actions. The game assigns utilities ui : S ! R or costs ui : S ! R to any player i at any joint action s 2 S: any player maximizes his utility ui(s) or minimizes his cost ci(s). As we recall from the introductory lectures, any finite game has a mixed Nash equilibrium (NE), but a finite game may or may not have pure Nash equilibria. Today we focus on games with pure NE. Some NE are \better" than others, which we formalize via a social objective function f : S ! R. Two classic social objectives are: P sum social welfare f(s) = i ui(s) measures social welfare { we make sure that the av- erage satisfaction of the population is high maxmin social utility f(s) = mini ui(s) measures the satisfaction of the most unsatisfied player A social objective function quantifies the efficiency of each strategy profile. We can now measure how efficient a Nash equilibrium is in a specific game. Since a game may have many NE we have at least two natural measures, corresponding to the best and the worst NE. We first define the best possible solution in a game Definition 1.
    [Show full text]
  • Price of Competition and Dueling Games
    Price of Competition and Dueling Games Sina Dehghani ∗† MohammadTaghi HajiAghayi ∗† Hamid Mahini ∗† Saeed Seddighin ∗† Abstract We study competition in a general framework introduced by Immorlica, Kalai, Lucier, Moitra, Postlewaite, and Tennenholtz [19] and answer their main open question. Immorlica et al. [19] considered classic optimization problems in terms of competition and introduced a general class of games called dueling games. They model this competition as a zero-sum game, where two players are competing for a user’s satisfaction. In their main and most natural game, the ranking duel, a user requests a webpage by submitting a query and players output an or- dering over all possible webpages based on the submitted query. The user tends to choose the ordering which displays her requested webpage in a higher rank. The goal of both players is to maximize the probability that her ordering beats that of her opponent and gets the user’s at- tention. Immorlica et al. [19] show this game directs both players to provide suboptimal search results. However, they leave the following as their main open question: “does competition be- tween algorithms improve or degrade expected performance?” (see the introduction for more quotes) In this paper, we resolve this question for the ranking duel and a more general class of dueling games. More precisely, we study the quality of orderings in a competition between two players. This game is a zero-sum game, and thus any Nash equilibrium of the game can be described by minimax strategies. Let the value of the user for an ordering be a function of the position of her requested item in the corresponding ordering, and the social welfare for an ordering be the expected value of the corresponding ordering for the user.
    [Show full text]
  • Prophylaxy Copie.Pdf
    Social interactions and the prophylaxis of SI epidemics on networks Géraldine Bouveret, Antoine Mandel To cite this version: Géraldine Bouveret, Antoine Mandel. Social interactions and the prophylaxis of SI epi- demics on networks. Journal of Mathematical Economics, Elsevier, 2021, 93, pp.102486. 10.1016/j.jmateco.2021.102486. halshs-03165772 HAL Id: halshs-03165772 https://halshs.archives-ouvertes.fr/halshs-03165772 Submitted on 17 Mar 2021 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Social interactions and the prophylaxis of SI epidemics on networkssa G´eraldineBouveretb Antoine Mandel c March 17, 2021 Abstract We investigate the containment of epidemic spreading in networks from a nor- mative point of view. We consider a susceptible/infected model in which agents can invest in order to reduce the contagiousness of network links. In this setting, we study the relationships between social efficiency, individual behaviours and network structure. First, we characterise individual and socially efficient behaviour using the notions of communicability and exponential centrality. Second, we show, by computing the Price of Anarchy, that the level of inefficiency can scale up to lin- early with the number of agents.
    [Show full text]
  • Strategic Behavior in Queues
    Strategic behavior in queues Lecturer: Moshe Haviv1 Dates: 31 January – 4 February 2011 Abstract: The course will first introduce some concepts borrowed from non-cooperative game theory to the analysis of strategic behavior in queues. Among them: Nash equilibrium, socially optimal strategies, price of anarchy, evolutionarily stable strategies, avoid the crowd and follow the crowd. Various decision models will be considered. Among them: to join or not to join an M/M/1 or an M/G/1 queue, when to abandon the queue, when to arrive to a queue, and from which server to seek service (if at all). We will also look at the application of cooperative game theory concepts to queues. Among them: how to split the cost of waiting among customers and how to split the reward gained when servers pooled their resources. Program: 1. Basic concepts in strategic behavior in queues: Unobservable and observable queueing models, strategy profiles, to avoid or to follow the crowd, Nash equilibrium, evolutionarily stable strategy, social optimization, the price of anarchy. 2. Examples: to queue or not to queue, priority purchasing, retrials and abandonment, server selection. 3. Competition between servers. Examples: price war, capacity competition, discipline competition. 4. When to arrive to a queue so as to minimize waiting and tardiness costs? Examples: Poisson number of arrivals, fluid approximation. 5. Basic concepts in cooperative game theory: The Shapley value, the core, the Aumann-Shapley prices. Ex- amples: Cooperation among servers, charging customers based on the externalities they inflict on others. Bibliography: [1] M. Armony and M. Haviv, Price and delay competition between two service providers, European Journal of Operational Research 147 (2003) 32–50.
    [Show full text]
  • Pure and Bayes-Nash Price of Anarchy for Generalized Second Price Auction
    Pure and Bayes-Nash Price of Anarchy for Generalized Second Price Auction Renato Paes Leme Eva´ Tardos Department of Computer Science Department of Computer Science Cornell University, Ithaca, NY Cornell University, Ithaca, NY [email protected] [email protected] Abstract—The Generalized Second Price Auction has for advertisements and slots higher on the page are been the main mechanism used by search companies more valuable (clicked on by more users). The bids to auction positions for advertisements on search pages. are used to determine both the assignment of bidders In this paper we study the social welfare of the Nash equilibria of this game in various models. In the full to slots, and the fees charged. In the simplest model, information setting, socially optimal Nash equilibria are the bidders are assigned to slots in order of bids, and known to exist (i.e., the Price of Stability is 1). This paper the fee for each click is the bid occupying the next is the first to prove bounds on the price of anarchy, and slot. This auction is called the Generalized Second Price to give any bounds in the Bayesian setting. Auction (GSP). More generally, positions and payments Our main result is to show that the price of anarchy is small assuming that all bidders play un-dominated in the Generalized Second Price Auction depend also on strategies. In the full information setting we prove a bound the click-through rates associated with the bidders, the of 1.618 for the price of anarchy for pure Nash equilibria, probability that the advertisement will get clicked on by and a bound of 4 for mixed Nash equilibria.
    [Show full text]
  • Efficiency of Mechanisms in Complex Markets
    EFFICIENCY OF MECHANISMS IN COMPLEX MARKETS A Dissertation Presented to the Faculty of the Graduate School of Cornell University in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy by Vasileios Syrgkanis August 2014 ⃝c 2014 Vasileios Syrgkanis ALL RIGHTS RESERVED EFFICIENCY OF MECHANISMS IN COMPLEX MARKETS Vasileios Syrgkanis, Ph.D. Cornell University 2014 We provide a unifying theory for the analysis and design of efficient simple mechanisms for allocating resources to strategic players, with guaranteed good properties even when players participate in many mechanisms simultaneously or sequentially and even when they use learning algorithms to identify how to play and have incomplete information about the parameters of the game. These properties are essential in large scale markets, such as electronic marketplaces, where mechanisms rarely run in isolation and the environment is too complex to assume that the market will always converge to the classic economic equilib- rium or that the participants will have full knowledge of the competition. We propose the notion of a smooth mechanism, and show that smooth mech- anisms possess all the aforementioned desiderata in large scale markets. We fur- ther give guarantees for smooth mechanisms even when players have budget constraints on their payments. We provide several examples of smooth mech- anisms and show that many simple mechanisms used in practice are smooth (such as formats of position auctions, uniform price auctions, proportional bandwidth allocation mechanisms, greedy combinatorial auctions). We give algorithmic characterizations of which resource allocation algorithms lead to smooth mechanisms when accompanied by appropriate payment schemes and show a strong connection with greedy algorithms on matroids.
    [Show full text]
  • Intrinsic Robustness of the Price of Anarchy
    Intrinsic Robustness of the Price of Anarchy Tim Roughgarden Department of Computer Science Stanford University 353 Serra Mall, Stanford, CA 94305 [email protected] ABSTRACT ble to eliminate in many situations, with large networks be- The price of anarchy, defined as the ratio of the worst-case ing one obvious example. The past ten years have provided objective function value of a Nash equilibrium of a game and an encouraging counterpoint to this widespread equilibrium that of an optimal outcome, quantifies the inefficiency of self- inefficiency: in a number of interesting application domains, ish behavior. Remarkably good bounds on this measure have decentralized optimization by competing individuals prov- been proved in a wide range of application domains. How- ably approximates the optimal outcome. ever, such bounds are meaningful only if a game’s partici- A rigorous guarantee of this type requires a formal behav- pants successfully reach a Nash equilibrium. This drawback ioral model, in order to define“the outcome of self-interested motivates inefficiency bounds that apply more generally to behavior”. The majority of previous research studies pure- weaker notions of equilibria, such as mixed Nash equilibria, strategy Nash equilibria, defined as follows. Each player i correlated equilibria, or to sequences of outcomes generated selects a strategy si from a set Si (like a path in a network). by natural experimentation strategies, such as simultaneous The cost Ci(s) incurred by a player i in a game is a function regret-minimization. of the entire vector s of players’ chosen strategies, which We prove a general and fundamental connection between is called a strategy profile or an outcome.
    [Show full text]
  • A Game-Theoretic Model of Attention in Social Networks
    A Game-theoretic Model of Attention in Social Networks Ashish Goel ⇤ Farnaz Ronaghi † March 25, 2012 Abstract We model the economics of producing content in online social networks such as Facebook and Twitter. We propose a game-theoretic model within which we quantify inefficiencies from contributions by strategic users in online environments. Attention and information are assumed to be the main motivation for user contributions. We treat attention as a mechanism for sharing the profit from consuming information and introduce a general framework for analyzing dynamics of contributions in online environments. We analyze the proposed model and identify conditions for existence and efficient computation of pure-strategy Nash equilibrium. We prove a bicriteria bound on the price of anarchy; in particular we show that the social welfare from central control over level of contribution by users is no larger than the social welfare from strategic agents with twice as large consumption utilities. We then construct and analyze a family of production games that have an arbitrarily large price of anarchy. We also prove non- robustness of the price of anarchy for a particular instance of the introduced family, establishing a distinction between the games studied here and network congestion games. 1 Introduction Social networking websites allow users to sign up and keep in touch with others by friending them. Users are allowed to post short status updates, photos, videos and links depending on the social network. Despite the di↵erences between these networks, one feature is common to many of them: Users see a linear news feed reflecting a chronologically sorted ordering of posts from friends whenever she logs into each of these sites [BCK+10].
    [Show full text]
  • Learning Graphical Games from Behavioral Data: Sufficient and Necessary Conditions
    Learning Graphical Games from Behavioral Data: Sufficient and Necessary Conditions Asish Ghoshal Jean Honorio [email protected] [email protected] Department of Computer Science, Purdue University, West Lafayette, IN, U.S.A. - 47907. Abstract identified, from congressional voting records, the most influential senators in the U.S. congress — a small In this paper we obtain sufficient and neces- set of senators whose collective behavior forces every sary conditions on the number of samples re- other senator to a unique choice of vote. Irfan and quired for exact recovery of the pure-strategy Ortiz [4] also observed that the most influential sena- Nash equilibria (PSNE) set of a graphical tors were strikingly similar to the gang-of-six senators, game from noisy observations of joint actions. formed during the national debt ceiling negotiations of We consider sparse linear influence games — 2011. Further, using graphical games, Honorio and Or- a parametric class of graphical games with tiz [6] showed that Obama’s influence on Republicans linear payoffs, and represented by directed increased in the last sessions before candidacy, while graphs of n nodes (players) and in-degree of McCain’s influence on Republicans decreased. at most k.Weshowthatonecanefficiently The problems in algorithmic game theory described recover the PSNE set of a linear influence above, i.e., computing the Nash equilibria, comput- game with k2 log n samples, under very O ing the price of anarchy or finding the most influ- general observation models. On the other ential agents, require a known graphical game which hand, we show that ⌦(k log n) samples are is not available apriori in real-world settings.
    [Show full text]
  • Closing the Price of Anarchy Gap in the Interdependent Security Game
    Closing the Price of Anarchy Gap in the Interdependent Security Game Parinaz Naghizadeh and Mingyan Liu Department of Electrical Engineering and Computer Science University of Michigan, Ann Arbor, Michigan, 48109-2122 Email: {naghizad, mingyan}@umich.edu Abstract—The reliability and security of a user in an intercon- these papers, under-investment in security is verified by finding nected system depends on all users’ collective effort in security. the levels of effort exerted in a Nash equilibrium of the IDS Consequently, investments in security technologies by strategic game, and comparing them with the socially optimal levels of users is typically modeled as a public good problem, known as the Interdependent Security (IDS) game. The equilibria for such investment. games are often inefficient, as selfish users free-ride on positive The increasing number of unprotected devices connected to externalities of others’ contributions. In this paper, we present a the Internet, the constant emergence of new security threats, mechanism that implements the socially optimal equilibrium in and the insufficiency of improved security technologies in an IDS game through a message exchange process, in which users compensating for the under-investment problem [7], motivates submit proposals about the security investment and tax/price profiles of one another. This mechanism is different from existing the study of mechanisms for improving network security. solutions in that (1) it results in socially optimal levels of Several methods for increasing users’ investments, and thus the investment, closing the Price of Anarchy gap in the IDS game, (2) reliability of the interconnected system, have been proposed in it is applicable to a general model of user interdependencies.
    [Show full text]
  • Design and Analysis of Sponsored Search Mechanisms
    DESIGN AND ANALYSIS OF SPONSORED SEARCH MECHANISMS A Dissertation Presented to the Faculty of the Graduate School of Cornell University in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy by Renato Paes Leme December 2012 c 2012 Renato Paes Leme ALL RIGHTS RESERVED DESIGN AND ANALYSIS OF SPONSORED SEARCH MECHANISMS Renato Paes Leme, Ph.D. Cornell University 2012 Auctions have become the standard way of allocating resources in electronic markets. Two main reasons why designing auctions is hard are the need to cope with strategic behavior of the agents, who will constantly adjust their bids seeking more items at lower prices, and the fact that the environment is highly dynamic and uncertain. Many market designs which became de-facto industrial standards allow strategic manipulation by the agents, but nevertheless display good behavior in practice. In this thesis, we analyze why such designs turned out to be so successful despite strategic behavior and environment uncertainty. Our goal is to learn from this analysis and to use the lessons learned to design new auction mechanisms; as well as fine-tune the existing ones. We illustrate this research line through the analysis and design of Ad Auc- tions mechanisms. We do so by studying the equilibrium behavior of a game induced by Ad Auctions, and show that all equilibria have good welfare and revenue properties. Next, we present new Ad Auction designs that take into ac- count richer features such as budgets, multiple keywords, heterogeneous slots and online supply. BIOGRAPHICAL SKETCH Renato Paes Leme was born in December 1st, 1984 in Rio de Janeiro, where he spent most of his life.
    [Show full text]
  • A Revisionist History of Algorithmic Game Theory
    A Revisionist History of Algorithmic Game Theory Moshe Y. Vardi Rice University Theoretical Computer Science: Vols. A and B van Leeuwen, 1990: Handbook of Theoretical Computer Science Volume A: algorithms and complexity • Volume B: formal models and semantics (“logic”) • E.W. Dijkstra, EWD Note 611: “On the fact that the Atlantic Ocean has two sides” North-American TCS (FOCS&STOC): Volume A. • European TCS (ICALP): Volumes A&B • A Key Theme in FOCS/STOC: Algorithmic Game Theory – algorithm design for strategic environments 1 Birth of AGT: The ”Official” Version NEW YORK, May 16, 2012 – ACM’s Special Interest Group on Algorithms and Computation Theory (SIGACT) together with the European Association for Theoretical Computer Science (EATCS) will recognize three groups of researchers for their contributions to understanding how selfish behavior by users and service providers impacts the behavior of the Internet and other complex computational systems. The papers were presented by Elias Koutsoupias and Christos Papadimitriou, Tim Roughgarden and Eva Tardos, and Noam Nisan and Amir Ronen. They will receive the 2012 Godel¨ Prize, sponsored jointly by SIGACT and EATCS for outstanding papers in theoretical computer science at the International Colloquium on Automata, Languages and Programming (ICALP), July 9–13, in Warwick, UK. 2 Three seminal papers Koutsoupias&Papadimitriou, STACS 1999: Worst- • case Equilibira – introduced the “price of anarchy” concept, a measure of the extent to which competition approximates cooperation, quantifying how much utility is lost due to selfish behaviors on the Internet, which operates without a system designer or monitor striving to achieve the “social optimum.” Roughgarden & Tardos, FOCS 2000: How Bad is • Selfish Routing? – studied the power and depth of the “price of anarchy” concept as it applies to routing traffic in large-scale communications networks to optimize the performance of a congested network.
    [Show full text]